12345

5/08/2012

[Warning] Malicious file about portrait infringement


1. Information

INCA Internet response team detected malicious file which contains malicious file disguised as a portrait file from 04 May 2012. On April, various reports about this file can be found on internet so far, yet it can be found in Korea. Besides, this malicious file has various variants; we add patterns on our nProtect Anti-Virus. Containing EXE(ZIP)file on attachment of e-mail has great possibility to be revealed as a malicious file.



2. Real cases

[Sophos]
IMG0893.zip - Your photo all over Facebook? Naked? Malware campaign spammed out

[nProtect Response Team Official Blog]
[Caution] Malicious e-mail about BBB(Better Business Bureau)

Following image contains various malicious files. The title of e-mail is "FW:Why did you put this photo online?" (It may contain about portrait infringement)

To Korea May 4, 2012


To Germany May 8, 2012


To Korea again May 8, 2012


ZIP typed attachment is disguising as an image file, and it actually contains executable file.


User will be infected by malicious files after extracting and executing ZIP file.


After being infected, clone file of malicious file will be created on "All Users" path.


And it adds registry on following path and makes run on booting.

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SunJavaUpdateSched c:\documents and settings\all users\svchost.exe


svchost.exe tries to access TCP/IP, yet it doesn't connect certain host.

3. Summary

Spreading malicious file with social engineering is one of traditional technique. To use PC safely from security threats of these malicious attachments, we recommend you download latest security updates and obey following "Security management tips" for general users.

Security management tips

1. Maintain the latest security update on OS and applications
2. Use anti-virus SW from believable security company and keep updating the latest engine and using real time detecting function.
3. Do not see and download attached file from suspicious e-mail.
4. Keep caution to link from instant messenger and SNS.

INCA Internet (Security Response Center / Emergency Response Team) runs responding system against various security threats.

17 comments:

  1. I've long thought that there are several different paths we could take to get to a more rational, egalitarian admissions system. The one I like most would make two changes to what we have in place right now at https://www.domyhomework4me.net/ do my homework for me


    ReplyDelete
  2. Need help with an argumentative essay writing? Follow my link and get it!

    ReplyDelete
  3. If you want to view a guide on writing a process essay, view it now then! Don't wait!

    ReplyDelete
  4. Let's play Super Mario Bros to save Mushroom Princess now !!! The Mushroom Princess is being held captive by the evil Koopa tribe of turtles.

    ReplyDelete
  5. I think there is much more to learn on this topic. Just click on this link to proceed.

    ReplyDelete
  6. Your article causes me to think deeply about this issue, but in general, I fully support your opinion. By the way, I came across another interesting article - https://essaysreasy.online/blog/easy-essay-topics - here are a lot of interesting tips and hints on how to make the future work better.

    ReplyDelete
  7. Your article can be a living illustration for the Internet security essay! Together with tips taken from https://writemyessay4me.org/blog/get-harvard the paper will definitely be top-notch! Let alone the fact that there one can find useful info how to enter the best universities in the world!

    ReplyDelete
  8. You better ignore this emails then virus everywhere.
    Megadede

    ReplyDelete
  9. With motive and means, someone who watches your online video could easily obtain your full address just by knowing the city or the state in which you live in. American Gods 2 streaming

    ReplyDelete
  10. To be fiar to myself I do not really understand the topic you discussed here, so the information provided here quite important for me as for the student who ought to write the essay on such topic, but apart from your blog I found quite informative the site where you can easily buy pre written essays so thanks a lot

    ReplyDelete
  11. A large number of individuals head to Google Video’s online website to look for more information on the features that allows them to make, upload, and share their own videos. altadefinizi.one

    ReplyDelete
  12. A business system isn’t hardware or software. zalukaj.ws

    ReplyDelete
  13. The information you shared with us was very helpful, thank you very much.

    ReplyDelete
  14. Oh, I know about mobile spyware a lot. This is what I call malicious!

    ReplyDelete